Dell PowerProtect Vulnerability Allows Root Command Execution
The National Vulnerability Database has disclosed CVE-2026-24504, a critical vulnerability impacting Dell PowerProtect Data Domain systems. Versions 7.7.1.0 through 8.6, along with LTS releases 8.3.1.0-8.3.1.20 and 7.13.1.0-7.13.1.60, are affected. This flaw stems from improper input validation.
A high-privileged attacker with remote access could exploit this weakness to achieve arbitrary command execution with root privileges. This is a significant risk, as these systems often house sensitive backup data. Attackers gaining root access could potentially tamper with backups, exfiltrate data, or use the compromised system as a pivot point into the broader network.
Defenders must prioritize patching these Dell PowerProtect Data Domain systems immediately. Given the potential for full system compromise, a thorough audit of access controls and network segmentation around these backup appliances is also warranted. Assume compromise until proven otherwise.
What This Means For You
- If your organization uses Dell PowerProtect Data Domain, immediately verify that your systems are patched beyond versions 7.7.1.0 through 8.6, LTS2025 8.3.1.0 through 8.3.1.20, and LTS2024 7.13.1.0 through 7.13.1.60. Given the 'root privileges' outcome, review logs for any unusual activity originating from these devices.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-24504 - Dell PowerProtect Root Command Execution via Input Validation
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-24504 | RCE | Dell PowerProtect Data Domain versions 7.7.1.0 through 8.6 |
| CVE-2026-24504 | RCE | Dell PowerProtect Data Domain LTS2025 release version 8.3.1.0 through 8.3.1.20 |
| CVE-2026-24504 | RCE | Dell PowerProtect Data Domain LTS2024 release versions 7.13.1.0 through 7.13.1.60 |
| CVE-2026-24504 | Improper Input Validation | Arbitrary command execution with root privileges |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 20, 2026 at 20:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.